computer forensics has limitations in representation formalism of the electronic evidence and data missing. A method in construction of electronic evidence chain was proposed on the basis of the study and analysis of ...
详细信息
computer forensics has limitations in representation formalism of the electronic evidence and data missing. A method in construction of electronic evidence chain was proposed on the basis of the study and analysis of event correlation, and it makes use of Bayesian network inference algorithm, which analysis of causal relationship of the events to deal with the missing data. This method to consider the interaction between evidence events and sequence relationship, it realizes formalization of the electronic evidence and reduces data redundancy in evidence analysis, which strengthens the pertinence of data process and evidence analysis, forensics system becomes more perfect.
In the development of information systems, Web tree component is an important way to show information, provide a convenient and intuitive information queries, which has become one of the essential features in the info...
详细信息
In the development of information systems, Web tree component is an important way to show information, provide a convenient and intuitive information queries, which has become one of the essential features in the information system. At present, Web tree component still has a series of problems in communication efficiency, displaying and updating rate, etc. This paper uses MyEclipse and MySql as development tools to design and implement web tree component based on WebSocket, the component can display and update tree structure dynamically, Theory analysis and experimental results show that the improved scheme provides a better user experience, comparing with the previous traditional long polling based on AJAX technology, it effectively reduces the amount of data transmission, communication overhead, etc.
Cooperative access among user devices by sharing wireless access bandwidth opens a new paradigm in heterogeneous networks. However, how to stimulate cooperative relay nodes forwarding service data for others and alloc...
详细信息
Cooperative access among user devices by sharing wireless access bandwidth opens a new paradigm in heterogeneous networks. However, how to stimulate cooperative relay nodes forwarding service data for others and allocating corresponding bandwidth to support it are two key issues in the cooperative access. This paper proposes a Stackelberg game based framework which is benefit participants including relay nodes and client nodes. This framework generalizes the pricing based bandwidth allocation algorithm by the Stackelberg game model, which optimizes the profit of the cooperative relay nodes while guaranteeing the bandwidth requirements of client nodes. We transform the profit maximization problem into a convex problem and solve it using the convex optimization method. The simulation results demonstrate that the proposed framework and corresponding algorithms outperform the bidding weight proportional fairness and fixed value bandwidth allocation ones significantly.
Ultrasound (US) images have been widely used in the diagnosis of breast cancer in particular. While experienced doctors may locate the tumor regions in a US image manually, it is highly desirable to develop algorithms...
详细信息
ISBN:
(纸本)9781457718571
Ultrasound (US) images have been widely used in the diagnosis of breast cancer in particular. While experienced doctors may locate the tumor regions in a US image manually, it is highly desirable to develop algorithms that automatically detect the tumor regions in order to assist medical diagnosis. In this paper, we propose a novel algorithm for automatic detection of breast tumors in US images. We formulate the tumor detection as a two step learning problem: tumor localization by bounding box and exact boundary delineation. Specifically, the proposed method uses an AdaBoost classifier on Harr-like features to detect a preliminary set of tumor regions. The preliminarily detected tumor regions are further screened with a support vector machine using quantized intensity features. Finally, the random walk segmentation algorithm is performed on the US image to retrieve the boundary of each detected tumor region. The proposed method has been evaluated on a data set containing 112 breast US images, including histologically confirmed 80 diseased ones and 32 normal ones. The data set contains one image from each patient and the patients are from 31 to 75 years old. Experiments demonstrate that the proposed algorithm can automatically detect breast tumors, with their locations and boundary shapes retrieved with high accuracy.
We present a tunable triple-band μ-negative metamaterial composed of loop resonator and ferrite. The tunable triple-band-stop transmission spectrum of such metamaterial is investigated numerically by full wave simula...
We present a tunable triple-band μ-negative metamaterial composed of loop resonator and ferrite. The tunable triple-band-stop transmission spectrum of such metamaterial is investigated numerically by full wave simulations. Moreover, the corresponding effective parameters are retrieved to illustrate the tunable μ-negative characteristic.
In this paper,we propose a novel polling algorithm to decrease the number of idle slots and collission slots during the polling cycle by evaluating the bandwidth request of the subscribe stations(SSs) in the next poll...
详细信息
In this paper,we propose a novel polling algorithm to decrease the number of idle slots and collission slots during the polling cycle by evaluating the bandwidth request of the subscribe stations(SSs) in the next polling cycle for broadband wireless access(BWA) *** firstly analyze the feature of silent time intervals and deduce the Hurst index which symbolizes the degree of self-similarity and long-relative *** we represent the inactive OFF time intervals by the Pareto model and estimate the shape parameterαby the group measured *** we can evaluate the transmission probability of a silent SS before the next polling cycle. By this algorithm,we can find the optimal transmission opportunities for the base station(BS) to achieve the least collision or void timeslots in order to achieve the largest bandwidth *** theoretical analysis and simulation results show that this polling algorithm can improve the performance for BWA system.
Considering the defects of conventional optimization methods, a novel optimization algorithm is introduced in this paper. Target space partitioning method is used in this algorithm to solve multi-objective optimizatio...
详细信息
Considering the defects of conventional optimization methods, a novel optimization algorithm is introduced in this paper. Target space partitioning method is used in this algorithm to solve multi-objective optimization problem, thus achieve the coherent solution which can meet the requirements of all target functions, and improve the population's overall evolution level. The algorithm which guarantees diversity preservation and fast convergence to the Pareto set is applied to structural optimization problems. The empirical analysis supports the algorithm and gives an example with program.
The camera extrinsic parameters interpolation is one of the key technologies in the application of 3D scene roaming etc. Since the space constructed by camera extrinsic parameters is not linear, the traditional method...
详细信息
To overcome the limitations of individual rationality, a game control model was proposed. The controller of game is global rational. To achieve global optimization, the controller chooses strategies according to the c...
详细信息
To overcome the limitations of individual rationality, a game control model was proposed. The controller of game is global rational. To achieve global optimization, the controller chooses strategies according to the control goal, and the controlled chooses the strategies according to the principle of individual rationality. Based on the model and the analysis of relationships and actions of DRM value chain, a model of DRM game control is presented. Content provider actions as the controller of the game, and the global optimization strategies which the content provider choose are discussed, which provides the guidance theory of rational DRM applications.
A 3D face recognition approach which uses principal axes registration(PAR)and three face representation features from the re-sampling depth image:Eigenfaces,Fisherfaces and Zernike moments is *** approach addresses th...
详细信息
A 3D face recognition approach which uses principal axes registration(PAR)and three face representation features from the re-sampling depth image:Eigenfaces,Fisherfaces and Zernike moments is *** approach addresses the issue of 3D face registration instantly achieved by *** each facial feature has its own advantages,limitations and scope of use,different features will complement each *** the fusing features can learn more expressive characterizations than a single *** support vector machine(SVM)is applied for *** this method,based on the complementarity between different features,weighted decision-level fusion makes the recognition system have certain fault *** results show that the proposed approach achieves superior performance with the rank-1 recognition rate of 98.36%for GavabDB database.
暂无评论